Sciweavers

774 search results - page 56 / 155
» Factors of generalized Fermat numbers
Sort
View
ATAL
2009
Springer
14 years 4 months ago
Effects of resource and remembering on social networks
To better represent human interactions in social networks, the authors take a network-oriented simulation approach to analyze the evolution of acquaintance networks based on local...
Chung-Yuan Huang, Yu-Shiuan Tsai, Chuen-Tsai Sun
CRYPTO
2009
Springer
150views Cryptology» more  CRYPTO 2009»
14 years 4 months ago
Improving the Security of Quantum Protocols via Commit-and-Open
We consider two-party quantum protocols starting with a transmission of some random BB84 qubits followed by classical messages. We show a general “compiler” improving the secur...
Ivan Damgård, Serge Fehr, Carolin Lunemann, ...
SIGIR
2009
ACM
14 years 4 months ago
Counting ancestors to estimate authority
The AncestorRank algorithm calculates an authority score by using just one characteristic of the web graph—the number of ancestors per node. For scalability, we estimate the num...
Jian Wang, Brian D. Davison
SOUPS
2009
ACM
14 years 4 months ago
Ubiquitous systems and the family: thoughts about the networked home
Developments in ubiquitous and pervasive computing herald a future in which computation is embedded into our daily lives. Such a vision raises important questions about how people...
Linda Little, Elizabeth Sillence, Pamela Briggs
FOCS
2008
IEEE
14 years 4 months ago
Computing the Tutte Polynomial in Vertex-Exponential Time
The deletion–contraction algorithm is perhaps the most popular method for computing a host of fundamental graph invariants such as the chromatic, flow, and reliability polynomi...
Andreas Björklund, Thore Husfeldt, Petteri Ka...